|
||||||
|
||
|
Home > Viruses software |
Related keywords: trojans viruses |
|
|
601. | V3pad WinAll 3000 (softoy.com) | ||
V3pad is launcher software of anti-virus program V3+Neo. V3+Neo carries high-speed virus scan engine and is updated one or more times in a week. That engine has no superior in scan speed and update term, but unfortunately, V3+Neo is a MSDOS program and so is inconvenient for using. V3pad is made to use V3+Neo conveniently under Windows. V3pad launches V3+Neo for a folder | |||
Updated: 9, 2005 | Rating: 53 | Author: Jesse Yoo | Size: 1397 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
602. | RegistryProt 2.0 (diamondcs.com.au) | ||
back to the original key setting, or deleting the key. RegistryProt's most useful attribute is that it will detect the vast majority of trojans at the exact moment that they infect/install themselves into your system, and as such provides a new dimension in trojan and intrusion detection. RegistryProt is a free, compact, realtime registry monitor and protector, that adds another | |||
Updated: 9, 2005 | Rating: 493 | Author: Wayne Langlois | Size: 68 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
603. | RenameWiz 3.4.2 (renamewiz.com) | ||
Incrementally number files with leading or trailing text and or zero's. Incrementally "Search and Replace" numbers. Remove file names or extensions while numbering. Rename files or folders to UPPER, lower, and Proper case. Remove any number of characters starting at any position. Change file | |||
Updated: 9, 2005 | Rating: 0 | Author: Thomas Hunt | Size: 1973 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
604. | Repeat Dialer 3.52.1 (kassistechnologies.com) | ||
If an important number happens to be busy, this application will recheck that number repeatedly for availability, for up to a user-set number of minutes. You simply press the dial button and provide the telephone number you want to call. If the line becomes free, you'll hear the ring signal. Just pick up your | |||
Updated: 9, 2005 | Rating: 42 | Author: Wasef Kassis | Size: 1843 kb | Shareware Go to category: Communications > Other Comms Tools Similar programs | |||
605. | Repellent 2.3.04 (easydesksoftware.com) | ||
can solve all your email and Internet virus worries with the click of a button, you can disable all VB and Java applets and scripting, as well as all Registry files. These are the viruses and worms that your virus scanner is trying to find and kill. These script viruses do the real damage, like "Melissa" and "KAK". A virus scanner can miss a new | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 1633 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
606. | RIS Menu Editor v1.0 1.0 (emboot.com) | ||
emBoot now offers the emBoot RIS Menu Editor, and takes (Microsoft's) RIS beyond it's out-of-the-box capabilities. emBoot's RIS Menu Editor extends the functionality of RIS by allowing network administrators to add menus and options to the RIS Client Installation Wizard, and to create | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Marfisi | Size: 460 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
607. | RIS Menu Editor v2.0 2.0 (emboot.com) | ||
emBoot now offers the emBoot RIS Menu Editor, and takes (Microsoft's) RIS beyond it's out-of-the-box capabilities. emBoot's RIS Menu Editor extends the functionality of RIS by allowing network administrators to add menus and options to the RIS Client Installation Wizard, and to create | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Marfisi | Size: 410 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
608. | Rocket Retriever 3.0 (pankhurst.com) | ||
Retriever organizes your computer's files into an easy to search list. Enter partial or full names to view all files with matching text in their names, ready to run or open. And pressing the Enter key on the entry runs the program, or launches your favorite program to let you view or edit the file. For example, typing in CAT lets you look for cat pictures, Once you've | |||
Updated: 9, 2005 | Rating: 0 | Author: David Pankhurst | Size: 707 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
609. | SAM 1.52 (metalgrass.com) | ||
SAM is a collection of useful utilities that can help you in day to day life. SAM is easily accesibly via the system tray or using keyboard shortcuts. The modules include: Reminders - Helps you to remember tasks. Jotter - A quick notes module. ToDo - manage your tasks easily. Units - Convert units | |||
Updated: 9, 2005 | Rating: 0 | Author: Ron Mertens | Size: 1831 kb | Shareware Go to category: Business > Calculators & Converters Similar programs | |||
610. | Secur-e-mail for Windows 1.20 (acmetoolz.com) | ||
Secur-e-mail will encrypt the communication between your e-mail client (e.g. Outlook) and the POP3 server using an SSH connection. No server-side installation is needed. The software runs on a Windows system tray. It will enable a local POP3 server on your computer, which will allow you to setup your e-mail | |||
Updated: 9, 2005 | Rating: 0 | Author: Sandra Anderson | Size: 510 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
611. | Credit Card Knight 1.3 (fspro.net) | ||
Prevent your credit card data from being stolen by carders. Most Internet Explorer users have autocomplete settings on. When you are shopping on-line and filling an order form, Internet Explorer saves the data you have entered into a safe place (Windows Protected Storage). Protected Storage, however, is not | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 776 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
612. | SendMail 1.01 (coolutils.com) | ||
Do you have to do routine work of watching some folder in case there have appeared any file and then you have to resend it? Now you can get down to something more interesting. Just download SendMail and let it do everything for you. For example Send Mail can receive the faxes, place them in one folder and | |||
Updated: 9, 2005 | Rating: 79 | Author: Alexander Buzaev | Size: 1200 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
613. | Sentry Pro Network Monitoring Solution 2.7 (sentry-pro.com) | ||
ISA) and for OS Platforms (Windows 2000, NT, XP). Due to it's web based interface Sentry Pro can be configured and administered, locally or remotely, thorough any browser from any location in the world, without needing any client components. By monitoring your network performance, Sentry Pro notifies you each time a specific or critical event occurs, allowing you to take | |||
Updated: 9, 2005 | Rating: 0 | Author: Ionel Orza | Size: 2960 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
614. | ShutDown NOW! 4.6 (dworld.de) | ||
as well as the access to some Windows features, like REGEDIT, Window's built-in shutdown, TaskManager, etc. ... SHDN! further can eject, load and watch all kinds of removable devices, if a medium is insert, or not, and ejecting and retracting only insert ones, multithreaded, prior to system shutdown, or anytime while working with Windows, by using the keyboard. - Also a keyboard- or | |||
Updated: 9, 2005 | Rating: 93 | Author: Carsten Stratz | Size: 1467 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
615. | Open+ Expert 2.1 (aidsoft.com) | ||
Benefits: * Open your files with the applications you want, not what Windows wants. * Use multiple versions of programs, e.g., browsers, viewers, etc. * Prevents newly installed programs from hijacking extensions. * No need for several configurations of file associations. * Eliminates the "Open With..." box | |||
Updated: 9, 2005 | Rating: 0 | Author: Reg Proctor | Size: 4285 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
616. | Panda AntiKAK Utility 1.0 (pandasecurity.com) | ||
Get rid of the KAK worm on your Windows 3X, 9X, ME, 2000 and DOS systems. Download the Panda AntiKAK Utility, which is a free standalone utility that is part of the award-winning Panda Antivirus Platinum. This utility is easy to use and will rid your system of the KAK worm for good, even if you do not have | |||
Updated: 9, 2005 | Rating: 0 | Author: Armando Bernal | Size: 391 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
617. | Panda Antivirus Platinum 6.0 (pandasecurity.com) | ||
scans and disinfects with the utmost effectiveness, eliminating viruses wherever they might be, while at the same time fully respecting the integrity of your data. It not only protects you from the entry of viruses but also prevents them from getting out and infecting other users. Panda Antivirus Platinum offers protection for Windows 95/98, Windows NT Workstation 3.51 and | |||
Updated: 9, 2005 | Rating: 39 | Author: Armando Bernal | Size: 5978 kb | Demo Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
618. | Panda Antivirus platinum 7 7.06 (pandasoftware.com) | ||
security solution that adapts perfectly to the needs of today's small businesses and professionals , protecting information from viruses and hackers with a single product. With a series of additional security features, including a firewall and script blocker , this new solution ensures complete protection against viruses, hackers and other Internet-borne threats | |||
Updated: 9, 2005 | Rating: 410 | Author: Panda Software | Size: 25470 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
619. | Panda Antivirus Titanium 2.04.04 (aidsoft.com) | ||
a new UltraFast scan engine, 30% faster than its predecessors, Panda's exclusive SmartClean technology, which not only disinfects viruses but also restores system settings damaged by the latest trojan horse technologies, and its low use of system resources. Coupled with a new best-of-breed truly automatic update system which takes advantage of your Internet connection to | |||
Updated: 9, 2005 | Rating: 290 | Author: Gloria Menchacatorre | Size: 14828 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
620. | Panda Enterprise Suite 2.5 (pandasoftware.com) | ||
Enterprise Suite offers global and uniform protection for the main virus entry points into your company: workstations, file servers, messaging and groupware platforms, firewalls and proxies. The new Panda Antivirus Enterprise Suite offers global and uniform protection for the main virus entry | |||
Updated: 9, 2005 | Rating: 0 | Author: Virginia Fernandez | Size: 66749 kb | Demo Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
621. | Password Officer DeLuxe 5.0 (compelson.com) | ||
Password Officer offers a professional solution for all your password issues: generating, entering, storing, securing, changing, organizing, transporting and accessing. Security coupled with convenience: the strongest possible encryption, secure database of your most valued secrets, automatic logon to | |||
Updated: 9, 2005 | Rating: 0 | Author: COMPELSON Laboratories | Size: 934 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
622. | PC DoorGuard 4 (astonsoft.com) | ||
system resources, thus allowing you to use it with any other anti-virus application for maximum protection. A full-featured professional anti-trojan fighter. Trojan database consists of more than 7500 trojan horses and is constantly updated. Using PDG you will easily detect and remove all known trojan horses running on your PC with a click of a | |||
Updated: 9, 2005 | Rating: 42 | Author: Maxim Afanasjev | Size: 6879 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
623. | Convert to TIFF with TIFF Printer Driver 6.0 (peernet.com) | ||
archive them or (automatically) attach them to an email message as a virus-free attachment. With the PEERNET TIFF converter your TIFF image is exactly what you see. Unlike other formats, which can display differently when converted, the TIFF image is identical to the original document. TIFF images | |||
Updated: 9, 2005 | Rating: 0 | Author: PEERNET Marketing | Size: 4396 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
624. | Perfect Companion 4.0.07 (easydesksoftware.com) | ||
that will help you maintain the integrity of your Registry. It's especially useful for PCs that have lots of software installed and uninstalled, as it cleans up the garbage left by many uninstallers. Registry scans are thorough and revolve around finding and removing invalid keys, and making sure that .dll and .ocx files are properly registered. An undo file is created that allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Easy Desk Software | Size: 3041 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
625. | PerformanceTest 6.0 (passmark.com) | ||
which are accurate to approx. 1 millionth of a second on most PC's. A major advantage is the built-in baseline results that enable computer systems to be compared. These baseline results can be used to determine how fast your computer is in comparison with other computer systems. The shareware version of PerformanceTest contains the baseline results from eight different computer | |||
Updated: 9, 2005 | Rating: 42 | Author: David Wren | Size: 3080 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
626. | FirmTools PhotoPrinter Pro 2.0 (firmtools.com) | ||
PhotoPrinter software will help you to print photos of a higher quality than in many other advanced programs due to our own algorithm of resizing. Automatic optimal arrangement of different sized photos on one page or multiple pages allows you to save the expensive photo paper and time necessary to position | |||
Updated: 9, 2005 | Rating: 0 | Author: Joe Kelner | Size: 2308 kb | Shareware Go to category: System Utilities > Printer Similar programs | |||
627. | Ping Alarm 1.4 (Pingalarm.narod.ru) | ||
This small and convenient program is intended for watching for presence computers at the Net. The program sends the request with a specific interval, determined by the user to selected computer. If it is exist - works alarm and programm issues the message "Name_of_the_computer is exist ". Also alarm works | |||
Updated: 9, 2005 | Rating: 1664 | Author: Roman Balabolko | Size: 290 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
628. | PrivacyKeyboard 6.1 (anti-hack.biz) | ||
shareware, freeware products, as well as in Trojan programs, viruses of very different operation principles. PrivacyKeyboard does not use any signature bases so it can protect even against unknown software or hardware keyloggers! Once installed PrivacyKeyboard will protect your privacy immediately and constantly. PrivacyKeyboard is the first product of its kind in the world that | |||
Updated: 9, 2005 | Rating: 0 | Author: Raytown Corporation LLC | Size: 2909 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
629. | ProBot SE 2.3.0 (nethunter.cc) | ||
what a keylogger could be ? SE is an advanced version of it's ProBot predcessor. SE (Special or Stealth Edition) is a totally invisible program and is packed with all of ProBot features as well. ProBot SE remains undetected even under the most prying eye. Unlike similar tools, ProBot SE makes it very easy to browse through activity logs. Its Control Panel organizes the data into | |||
Updated: 9, 2005 | Rating: 48 | Author: Andrei Birjukov | Size: 2236 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
630. | Protect Folder 98 3.0 (everstrike.com) | ||
files also effectively protects you from malicious programs, such as viruses, worms, and trojans. Here is how Protect Folder 98 works - all you have to do is to drag the file or folder that you want to lock to the Protect Folder 98 window, and the rest is done automatically. Now your data is protected and hidden and cannot be accessed without entering your personal password. It is | |||
Updated: 9, 2005 | Rating: 48 | Author: Richard Davids | Size: 772 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
631. | Protector Plus for Exchange 7.2.F02 (protectorplus.com) | ||
Plus for Exchange is an anti-virus software designed for Microsoft Exchange server. Protector Plus scans all the emails received by the mail server and it blocks all the infected emails. Protector Plus ensures that the network will be free of viruses that spread through email. Protector Plus detects emails infected by all types of viruses, trojans and worms before | |||
Updated: 9, 2005 | Rating: 0 | Author: Kartheek S | Size: 2949 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
632. | Quick Calendar 1.00 (quickcal.215software.com) | ||
Calendar displays the day of the month in your system tray. It's a very handy way to quickly know the date without having to move your mouse - the PC equivalent to having a date display on your watch. Just glance at your screen not your wrist! Key Features: - Fast and Easy viewing of the current date - Date icon for your system tray - Push Pin - Calendar Details | |||
Updated: 9, 2005 | Rating: 0 | Author: 215 Technology, Inc. | Size: 909 kb Go to category: Business > PIMS & Calendars Similar programs | |||
633. | QuoTracker 2.4 (quotestudio.com) | ||
QuoTracker is a tool which facilitates the monitoring and tracking of your investment in global stock markets and US/Can. mutual funds. It collects and connects information (chart, quote, news, profile etc.) from different free Internet services, puts everything onto an easy-to-glance Explorer-like interface | |||
Updated: 9, 2005 | Rating: 0 | Author: Ming Liu | Size: 6149 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
634. | R-Drive Image 3.0 (drive-image.com) | ||
the original disks, on any other partitions or even on a hard drive's free space on the fly. To restore system and other locked partitions R-Drive Image is switched to the pseudo-graphic mode directly from Windows or bootable version created by the utility is launched from CD disc or diskettes. Using | |||
Updated: 9, 2005 | Rating: 1207 | Size: 11366 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
635. | R-Linux 1.0 (r-tt.com) | ||
file system. File recovery after power failure, system crash, virus infection or partition reformation, even for the different file system. Unformat and unerase tool. Creation of image files an entire disk, partition or its part. Such drive image can be processed like regular drive. Recognition and parsing of Dynamic (Windows 2000/XP), Basic and BSD (UNIX) partitions layout | |||
Updated: 9, 2005 | Rating: 743 | Size: 1382 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
636. | R-Studio Data Recovery Software 2.0 (data-recovery-software.net) | ||
unerase and file recovery after FDISK, MBR destruction, FAT damaged, virus infection. Creates drive image for further data recovery. Dynamic disk support. Damaged RAID (Volume and Stripe sets) reconstruction. Recovering encrypted files, compressed files and alternative data streams. File or disk content can be viewed and edited in the hexadecimal editor, which supports NTFS file | |||
Updated: 9, 2005 | Rating: 1360 | Size: 2099 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
637. | R-Undelete 2.0 (r-tt.com) | ||
host OS when files were: removed without Recycle Bin; removed by virus attack or power failure; removed when Recycle Bin has been emptied. Recovering encrypted files, compressed files and alternative data streams. R-Undelete recognizes localized names and supports Dynamic Disks. New R-Undelete 2.0 is integrated into Windows Explorer shell and all undelete and file recovery | |||
Updated: 9, 2005 | Rating: 477 | Size: 942 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
638. | Love You Not 1.10 (pcshareware.com) | ||
any request to execute all scripting file types used in email virus attacks. These include: Visual Basic scripts (.VBS, .VBE, .VB), Javascript (.JS, .JSE), Scrap objects (.SHS, .SHB), HTML application files (.HTA) and other potentially dangerous file types. Love You Not! also will increase the default Internet security zone setting used by Windows from "Internet" zone to | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Kapusta | Size: 870 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
639. | MailUtils 1.01 (homepage.ntlworld.com) | ||
Five utilities for administrators of MSmail postoffices* are provided in one program: "User List > Text File" generates a list of all local users giving details of their mailbag number, MMF file size and the number of e-mails waiting for them. "Mailbag > Text File" identifies the owner of any mailbag and | |||
Updated: 9, 2005 | Rating: 173 | Author: Brian Taylor | Size: 621 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
640. | MaxMonkey 2.24 (homepage.ntlworld.com) | ||
Window visibility manager: View hidden or stealth programs or viruses that maybe running without your knowledge or consent. Detect applications that are hidden and still running but no longer in use. Windows state manager: MaxMonkey is a windows maximizer, minimizer, restorer and closer. With one easy left-click, double-click or middle-mouse-button click, MaxMonkey can | |||
Updated: 9, 2005 | Rating: 0 | Author: monkey job | Size: 350 kb | Shareware Go to category: System Utilities > Shell Tools Similar programs | |||
641. | Memory Defragmenter 1.1 (abexo.com) | ||
Memory Defragmenter is a software to free up wasted RAM. What is memory (RAM) fragmentation? Windows programs use RAM (Random Access Memory) for their operations, however sometimes they fail to release the RAM after use. This means that parts of your RAM is occupied holding useless data and your computer | |||
Updated: 9, 2005 | Rating: 0 | Author: Abexo Marketing | Size: 619 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
642. | Microangelo 5.56 (impactsoftware.com) | ||
Microangelo, the “Grand-daddy” of icon software, provides a total solution for Windows software developers, graphic designers and home users. Voted “Best Graphics Program” three years running at the 2000, 2001, and 2002 Shareware Industry Awards, this award winning toolset offers performance and value that | |||
Updated: 9, 2005 | Rating: 1418 | Author: Len Gray | Size: 2900 kb | Shareware Go to category: Graphic Apps > Icon Tools Similar programs | |||
643. | Piramidka 1.00 (zwnet.bmj.net.pl) | ||
books. Original game is known under few names but in most cases it's called Piramidka (that means 'pyramid' in Polish). Piramidka, just like others solitaire-like games isn't too popular among modern computer users. It's forgotten in this world ruled by extremely advanced games. But don't worry, this program will allow you to learn rules of this interesting game and will also | |||
Updated: 9, 2005 | Rating: 0 | Author: Piotr Chodzinski | Size: 491 kb | Freeware Go to category: Games & Entertainment > Other Similar programs | |||
644. | Biz Mail 1.00 (axolot.se) | ||
has e-mail as a part of your daily work. Here are some of Biz Mail's features: * Receive mail from POP3, IMAP or Hotmail accounts. * Full support for formatted (Html) mails. You can view, send receive and reply on formatted mails. * Biz Mail uses standard EML files for storing mails. Each mail is | |||
Updated: 9, 2005 | Rating: 0 | Author: Lars Arvidsson | Size: 4924 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
645. | Search Favorites 1.5 (searchfavorites.com) | ||
modules needed for your installation are downloaded. Everything is virus checked and digitally signed and checked on download. The installation uses Microsoft's Windows Installer Version 2, as included with Windows XP, and we upgrade your version of Windows Installer as needed using the | |||
Updated: 9, 2005 | Rating: 0 | Author: William Hite | Size: 76 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
646. | SiteMonNak 2004 V1.0.0 (nakware.com) | ||
SiteMonNak can monitor and report on the status of a variety of items that affect the accessibility of web sites including https web sites, items like DNS, Ping and HTTP response. What items you have monitored is very flexible. When a problem is detected you can be informed in a variety of different ways | |||
Updated: 9, 2005 | Rating: 0 | Author: Andy Erceg | Size: 1380 kb | Shareware Go to category: Web Development > HTML Tools Similar programs | |||
647. | Fantastic ASCII Art: Picture Paradise 1.2 (absolutist.com) | ||
This is more than a super modern digital screensaver for those who are fed up with everything standart and trite. If you want something original and unhackneyed - it is especially for you. Dozens of various images pass in front of your eyes, changing as the patterns in kaleidoskope. All scopes of the | |||
Updated: 9, 2005 | Rating: 42 | Author: Absolutist Team | Size: 1577 kb | Shareware Go to category: Desktop > Similar programs | |||
648. | AllnSync 3.5.2 (rlegsoftware.com) | ||
a very fast and easy to use Directory / File synchronizer. It's main function is to synchronize critical files in a selected directory and it's sub-directories on two different drives which can be on the same computer, or different computers over a network. It is ideal for keeping | |||
Updated: 9, 2005 | Rating: 0 | Author: Ray Giovagnoli | Size: 1554 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
649. | fitW (fine tuning of Windows) 4.0.0.4000 (mtsv.fromru.com) | ||
Automatic determination of version of system. Depending on system's version, occurs the disabling of unnecessary parameters. The program has a anti-virus protection, which is blocking a starting of program. Optimizer of network connection with Internet. Recommended variants of the network's tuning. Processes Manager. Program is simple in using. For the simplicity, all | |||
Updated: 9, 2005 | Rating: 0 | Author: MTsv DN | Size: 193 kb | Shareware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
650. | Lock Folder XP 3.4 (everstrike.com) | ||
also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder XP works - all you have to do is to drag file or folder you want to lock to Lock Folder XP window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 126 | Author: Richard Davids | Size: 1243 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
651. | Monidir 2000 1.0 (contactplus.com) | ||
e-mail or via an audible and visible alarm. Good for potential virus | |||
Updated: 9, 2005 | Rating: 0 | Author: Ed Trujillo | Size: 505 kb | Freeware Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
652. | Multilingual Speaking Clock 2.5 (lux-aeterna.com) | ||
Speaking alarm clock which announces the time in over 30 different languages (American English is included, additional languages are available on the website) . Includes alarm that can announce the time and play any WAV-file. Full graphical display in two sizes, resembling a liquid crystal display. Online | |||
Updated: 9, 2005 | Rating: 0 | Author: Leif Almgren | Size: 914 kb | Freeware Go to category: Desktop > Clocks & Alarms Similar programs | |||
653. | My Firewall Plus 5.0 (webroot.com) | ||
your data. Today hackers and web snoops are using more sophisticated viruses, cookies, Trojan Horses and other malicious software tools to gain access to your PC. Once they gain access, they put unsafe applications on it that are designed to expose your data from the inside. My Firewall Plus protects | |||
Updated: 9, 2005 | Rating: 0 | Author: Steve Thomas | Size: 6006 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
654. | My Screen Cam 2.1.0 (uk-software.com) | ||
capture devices. The best thing about My ScreenCam is that it`s completely free. My ScreenCam turns your capture device or web camera in to a television/vcr combination. You can watch your camera full screen (or any other size), alter the preview speed and many more features. You can even record your camera as an .avi | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Bellwood | Size: 237 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
655. | Child Control 2005 7.153 (salfeld.com) | ||
The most optimal parental control for all Windows-PCs (incl. XP). Set time limits for the PC and/or the Internet and block/filter unwanted Internet contents. Limit access to internal Windows components and personal folders. A protocol informs you at any time as to what happened on your computer and when | |||
Updated: 9, 2005 | Rating: 16 | Author: Dierk Salfeld | Size: 3703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
656. | NetMailBot 5.0.1 (exclamationsoft.com) | ||
NetMailBot is the most powerful command line email client for sending and receiving email on the market today. It runs from a DOS command prompt, which allows it to be easily called from other applications. In fact, many of our customers run NetMailBot from existing applications to send email notices | |||
Updated: 9, 2005 | Rating: 0 | Author: ExclamationSoft Corporation | Size: 3028 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
657. | NetWorx 3.2 (softperfect.com) | ||
NetWorx is a simple, yet powerful tool that helps you objectively evaluate your bandwidth situation. You can use it to collect bandwidth usage data and measure the speed of your Internet or any other network connection. NetWorx can help you identify possible sources of network problems, ensure that you don't | |||
Updated: 9, 2005 | Rating: 16 | Author: Andrey Kotov | Size: 982 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
658. | NT Perfect Companion 4.0.06 (easydesksoftware.com) | ||
that will help you maintain the integrity of your Registry. It's especially useful for PCs that have lots of software installed and uninstalled, as it cleans up the garbage left by many uninstallers. Registry scans are thorough and revolve around finding and removing invalid keys, and making sure that .dll and .ocx files are properly registered. An undo file is created that allows | |||
Updated: 9, 2005 | Rating: 0 | Author: Guy Young | Size: 3226 kb | Shareware Go to category: System Utilities > Registry Tools Similar programs | |||
659. | XP System Sentry 2.2.05 (easydesksoftware.com) | ||
Check, detects files that are corrupt or possibly infected by a virus. - A utility for expanding compressed files, allows the user to install Windows installation files. - Quick Scan, finds and corrects file version conflicts that can cause your system to often lock up. It finds system files that have been added or deleted. - System Version Checker finds and fixes incorrect | |||
Updated: 9, 2005 | Rating: 39 | Author: Guy Young | Size: 3722 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
660. | fsMechanic 1.1 (freewebs.com) | ||
Flash drives, digital cameras, digital players, etc. Removed by virus attack or power failure. Trough unwanted deleting. Damaged files. fsMechanic - fast and powerful solution for data recovering. Implements 3 original algorithms, supports FAT and NTFS, has a simple "Explorer"-like interface and much | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexey Babenko | Size: 438 kb | Demo Go to category: System Utilities > File & Disk Management Similar programs | |||
661. | Geek Superhero 1.3 (geeksuperhero.com) | ||
reject the change. This catches many of the modifications made by a virus, trojan or worm; protecting your computer from harm. (A "Computer Setting Firewall" is an excellent description.) It includes other features to help you protect your computer from hackers and worms by disabling rarely used Windows services, it helps you protect your privacy by blocking popup advertising | |||
Updated: 9, 2005 | Rating: 16 | Author: Michael Burford | Size: 2548 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
662. | GetDataBack for FAT 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, FAT or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1267 | Author: Ragnhild Fesel | Size: 2811 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
663. | GetDataBack for NTFS 2.31 (runtime.org) | ||
scenario is - GetDataBack will recover your data if the hard drive's partition table, boot record, MTF or root directory are lost or damaged, data was lost due to a virus attack, the drive was formatted, fdisk has been run, a power failure has caused a system crash, files were lost due to a | |||
Updated: 9, 2005 | Rating: 1729 | Author: Ragnhild Fesel | Size: 2789 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
664. | GoodBye Spy 4.01 (tekeffect.com) | ||
Advanced spyware removal and real time monitoring utility. GoodBye Spy is a multi-adware removal program, which supports the removal of spyware, adware, Brotherware, and more. It scans your registry, memory, and drives, then allows you to remove these unwanted files from your system. To offer greater | |||
Updated: 9, 2005 | Rating: 0 | Author: TekEffect | Size: 608 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
665. | Hara-Kiri 2.02 (cyteg.com) | ||
"Hara-Kiri" (ex "Dontouch") is a radical way to keep your confidential data away from unauthorized access by "self-destructing" The files that you specify. How it works: While Windows is starting up it checks to see if you are pressing a combination of certain keys. If those keys are not being pressed | |||
Updated: 9, 2005 | Rating: 0 | Author: Viktor Korokhin | Size: 601 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
666. | HS SoBigRemover 1.2 (haysoft.com) | ||
software must be used to detect large number of SoBig viruses in an email account and delete them remotely without the need of downloading any of them to your machine. SoBig virus is large sized email so it uses network traffic when receiving to your machine. This software can be an | |||
Updated: 9, 2005 | Rating: 0 | Author: Cenker Sisman | Size: 576 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
667. | Iconic Tray 1.21 (iconictray.com) | ||
tray is easy: simply right-click (or middle-click) on the window's "Minimize" button. Anytime you want to view the minimized windows, just open the Iconic Tray icon to see a menu list - click on a window in the list and it's back on screen again. It really is that easy. Of course, if you had chosen to minimize to the system tray, just restore your window as you would any other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dmitry Nikitin | Size: 47 kb | Shareware Go to category: Desktop > Other Similar programs | |||
668. | Identity Knight 1.3 (fspro.net) | ||
on secure technologies, we tend to neglect basic precautions. Let's look at Internet Explorer, the most popular web browser on the Net. On the one hand, starting with version 5, it offers a convenient AutoComplete feature, allowing you to enter your credentials once and let the program do the rest. On the other hand, though, Internet Explorer stores this information in an unprotected | |||
Updated: 9, 2005 | Rating: 0 | Author: FSPro Labs | Size: 772 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
669. | IntraMail 2003.01.20 (dplanet.ch) | ||
Secure exchange of messages in a local network Intranet (Windows 95, 98, Me, NT, 2000, XP). The mail (or Email) can be written or read from any PC easily. Every mail-account can be protected by a password. The personal messages are always strongly encrypted (with 3 adaptive codes). These short mails are Every mail-account can be protected by a password. Personal messages are strongly encrypted | |||
Updated: 9, 2005 | Rating: 42 | Author: Jean-Maurice Tellenbach | Size: 2918 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
670. | KeyIt! 2.0 (keyit.com) | ||
programs, and surf the web with just keystrokes. But that's not all. You can also download additional modules from our website which cater to specific tasks. For exmple, with our InternetStuff module, you have instant access to ten search engines, an encyclopedia, dictionary, thesaurus, auction search, or a stock quote, all simply by typing 'wwww'. With our | |||
Updated: 9, 2005 | Rating: 0 | Author: Kevin O'Donnell | Size: 2574 kb | Shareware Go to category: System Utilities > Clipboard Tools Similar programs | |||
671. | KeyText 2.25 (mjmsoft.com) | ||
Multi-purpose text and automation utility. KeyText stores pieces of text, ready to be typed or pasted into any application by a simple hotkey press or menu selection. "Right-click anywhere" feature makes form-filling easier than ever. Include commands to run programs, click buttons, change windows, visit | |||
Updated: 9, 2005 | Rating: 145 | Author: MJMSoft Design | Size: 623 kb | Shareware Go to category: System Utilities > Automation Tools Similar programs | |||
672. | LAN Find 3.1 (ihsoftware.net) | ||
Find software installs in network archives! - Find all temporary or virus generated files and delete them! - Search your local computer for the same things! Fast file search on network or your computer! LAN Find is a powerful search engine for your LAN or computer. Find any files (e.g. mp3, avi) | |||
Updated: 9, 2005 | Rating: 1263 | Author: Dmitry Veshkovich | Size: 927 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
673. | LetUknow 2.03 (mhsoftware.co.uk) | ||
LetUknow provides a "peace of mind" method of monitoring your LAN and resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals - you choose how often. If a test fails, the appropriate individuals are notified immediately, resources. You can specify numerous jobs and tests in advance on a "set and forget" basis, which LetUknow then runs at regular intervals | |||
Updated: 9, 2005 | Rating: 0 | Author: Richard Mace | Size: 2101 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
674. | Lock Folder 5.0 (realclicks.com) | ||
files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 146 | Author: Leo van Opstal | Size: 1400 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
675. | DVD Ripper Copy Pro Pro (ChineseEnglishTranslation.org) | ||
Ripper Copy Pro is the easiest way to copy DVD's. With DVD Ripper Copy Pro You Can: Copy DVD's to CDR and watch them on your DVD player. Copy DVD's to your computer and watch them on your computer.Make instant backups of your DVD's. Never worry about scratching or loosing your DVD's again! DVD Ripper Copy Pro is the easiest way to copy | |||
Updated: 9, 2005 | Rating: 16 | Author: Anderson Trueman | Size: 1000 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
676. | Email Audit 3.2 (km-vision.com) | ||
Compliments Outlook Rules implementations. Moves suspect mails (Virus mails etc) to suspect mails folder Generate regular Audit Reports. KMsoft can also take Advanced Mail solutions projects such as Enterprise Mail Track, Enterprise mail archival,Mail to EDI conversion,EMS,Web based Email Response | |||
Updated: 9, 2005 | Rating: 0 | Author: Shama Hegde | Size: 8172 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
677. | Employee Monitoring 3.1 (employeemonitoring.net) | ||
E.M. searches for and alerts prohibited Internet use. It's advanced architecture is designed especially for large companies, universities, libraries and ISPs, yet its methods and feature set are configured for non-technical deployment and utilization. Employee Monitoring overcomes the 5 Main Obstacles of Employee Internet Monitoring (EIM) corporate deployment: 1) High | |||
Updated: 9, 2005 | Rating: 0 | Author: Cameron Shellum | Size: 805 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
678. | EscapeClose Pro 1.9 (sanapesoft.com) | ||
EscapeClose Pro is a tiny utility, allowing you to close or minimize the active window by pressing the Esc button. And now you can hide active window. Thus you can see it neither in the TaskBar nor in the Task Manager list (Ctrl+Alt+Del) nor in the list opening by pressing Alt+Tab. Or, to work more carefully | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexander Moshkov | Size: 319 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
679. | EtherScout 1.10 (globalpatrol.net) | ||
EtherScout is an Internet traffic monitoring utility that sits in your network and records and analyzes traffic patterns of Internet usage. Reports can be generated in real time, showing detailed information on what users are doing, or trends of surfing behavior on your network. After collecting this | |||
Updated: 9, 2005 | Rating: 0 | Author: Global Patrol | Size: 1216 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
680. | F-Secure Anti-Virus 2004 2004 (f-secure.com) | ||
F-Secure Anti-Virus 2004 you can surf on the Internet, open e-mail attachments and use your computer without any fear of virus infections. You can also be sure that you are not sending viruses to others. Especially for home users and small offices without dedicated IT-staff, F-Secure Anti-Virus 2004 provides maintenance-free, easy-to-use protection | |||
Updated: 9, 2005 | Rating: 34 | Author: F-Secure Corporation | Size: 6866 kb | Commercial Go to category: System Utilities > Other Similar programs | |||
681. | F-Secure Internet Security 2003 2003 (f-secure.com) | ||
now a highly advanced service against viruses and break-in attempts when you are connected to the Internet! F-Secure Internet Security 2003 includes an award winning antivirus software and an easy-to-use personal firewall product that protects your system against break-in attempts when you are connected to the Internet. Especially for home users and small offices without | |||
Updated: 9, 2005 | Rating: 45 | Author: F-Secure Corporation | Size: 6416 kb | Commercial Go to category: Security & Privacy > Anti-Virus Tools Similar programs | |||
682. | Field Filler 1.00 (yildun.com) | ||
Field Filler is a HTML Form and clipboard tool software which can open and save various Field Filler text databases. With a Field Filler you can easily copy and paste from the clipboard your most used text and also you can fill an HTML Form fields with just a one click on the button. To copy text onto | |||
Updated: 9, 2005 | Rating: 0 | Author: Samir Alicehajic | Size: 738 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
683. | FileMap by BB 4.0.4 (dogkennels.net) | ||
Don't become complacent with Internet security. There could be times when your firewall is out-smarted allowing files to be secretly installed to hard disk through no fault of your own. For other reasons, files in the windows and system directories will mysteriously grow over time. If you had a record of | |||
Updated: 9, 2005 | Rating: 30 | Author: Bernie Madigan | Size: 144 kb | Freeware Go to category: Security & Privacy > Other Similar programs | |||
684. | FileSpy 3.0 (ic.net) | ||
who are using a specific file. It also allows viewing of the user's rights to the file/directory, how the file was opened, the user's network address, and the date and time the user logged in to the network. With FileSpy you can also send messages to selected network users and if you have | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2014 kb | Shareware Go to category: Network & Internet > Network Monitoring Similar programs | |||
685. | FileSpy Pro 2.0 (ic.net) | ||
With FileSpy Pro you can also send messages to users, clear user's connections, unlock locked files, get extended file information, and run queries against the log database to discover important details about file usage. FileSpy Pro is a powerful file monitoring utility for Novell file servers | |||
Updated: 9, 2005 | Rating: 0 | Author: Frank Kusluski | Size: 2322 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
686. | FitoNT 1.0.0.0 (netnet.ca) | ||
today's day and age, your personal or company data is in danger 24 hours a day 7 days a week. That 7 day span, or 24 hour span is to long to have your valuable data in harms way. Your data is under constant threat from virus's brought in by employee's checking their e-mail, internet hackers, unexpected hard drive or hardware crashes, and any other dangers | |||
Updated: 9, 2005 | Rating: 0 | Author: Boris na | Size: 3752 kb | Freeware Go to category: System Utilities > Backup & Restore Similar programs | |||
687. | FlipPublisher 1.0 (flipalbum.com) | ||
FlipPublisher is an authoring tool for digital publications. With FlipPublisher, you can easily publish magazines, novels, textbooks, catalogs, brochures, portfolios, manuals, and more as a FlipBook on the Web or on CDs for viewing on a PC. FlipPublisher empowers the owners of content to become their own | |||
Updated: 9, 2005 | Rating: 88 | Author: E-Book Systems, Inc. | Size: 9239 kb | Shareware Go to category: System Utilities > Text/Document Editors Similar programs | |||
688. | FolderAccess 2.0 (lockfolder.net) | ||
files also effectively protects you from malicious programs, such as viruses, worms and trojans. Here is how Lock Folder works - all you have to do is to drag file or folder you want to lock to Lock Folder window, and the rest is done automatically. Now your data is protected, hidden and can not be accessed without entering your personal password. It is critical to have effective | |||
Updated: 9, 2005 | Rating: 0 | Author: Leo van Opstal | Size: 4313 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
689. | FontMap 2.41 (ccountry.net) | ||
FontMap may be used to view and print both installed and external fonts; it can display a variety of tables, individual characters, a keyboard view, font description, or whatever text you wish to enter. Individual characters can be displayed in a "full-screen" view and custom table parameters can be set to | |||
Updated: 9, 2005 | Rating: 0 | Author: Gary Dix | Size: 336 kb | Shareware Go to category: Desktop > Cursors & Fonts Similar programs | |||
690. | CopyLock 1.08 (noeld.com) | ||
which are currently in use (e.g. system files like comctl32.dll, or virus/trojan files.) Add the files to update, click Apply, restart and that's it! You can also list and edit the pending operations from the system after you ran an installer or view the processes which use the locked files | |||
Updated: 9, 2005 | Rating: 0 | Author: Noel DANJOU | Size: 121 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
691. | Crime Catcher 2.1 (crime-catcher.com) | ||
Crime Catcher is software for your webcam that allows your computer to act as a security system. The software will monitor for motion and if detected actions can take place. For a full list of features see below: Advanced motion detection; Every single pixel being monitored for change. Hide Crime | |||
Updated: 9, 2005 | Rating: 124 | Author: Edward Torkington | Size: 4373 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
692. | Custom StartUp 3.01 (gboban.com) | ||
you reject. This may be also useful in protection from some types of viruses. Custom StartUp helps you to manage which programs will be stared when Windows starts. Moreover, Custom StartUp allows you to backup and restore configurations later. Also, you can quickly apply start-up configuration and restart or shutdown your | |||
Updated: 9, 2005 | Rating: 0 | Author: Goran Boban | Size: 572 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
693. | Daily Backup 2.08 rel b (softwaremeister.com) | ||
Daily Backup quickly creates zip archives of just the changed (or created) files. Once you've set it up, you'll barely notice your safety net. Schedule your backups: as soon as you changed (or created) a file, at fixed time periods, when the screen saver is running, or on the end of the session. Note that see the generations of files; go back to a previous generation whenever you want | |||
Updated: 9, 2005 | Rating: 43 | Author: Thomas Gawehns | Size: 1319 kb | Shareware Go to category: System Utilities > Backup & Restore Similar programs | |||
694. | DataLock 1.0 (unicorntech.net) | ||
Most people store their information on their computer and expect it to be safe. But is it really safe? ...Achieve easy file - folder Security with Datalock for any file/folder, any size, any format - High ratio Data Compression achieved - Secure communication of data over internet, LAN/WAN - No need to | |||
Updated: 9, 2005 | Rating: 0 | Author: Parish Meghani | Size: 1213 kb | Demo Go to category: System Utilities > Other Similar programs | |||
695. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
696. | Desktop Scout 4.0 (globalpatrol.net) | ||
Desktop Scout is a powerful computer surveillance program which can be used in the home, school or office to monitor and record every detail of PC and Internet activity. The program contains several integrated tools which work together at the same time to record all programs used, keystrokes typed, web sites | |||
Updated: 9, 2005 | Rating: 56 | Author: Global Patrol | Size: 1291 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
697. | Personal Desktop Spy 2.10 (spyarsenal.com) | ||
Desktop Spy Agent is an invisible and easy-to-use PC activity monitoring tool that captures screenshots of the active application window or the entire desktop at the predefined time intervals varying from 1 second to several hours and saves the recorded images to a specified directory on the hard drive. The | |||
Updated: 9, 2005 | Rating: 0 | Author: Mikhail Kalinskiy | Size: 615 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
698. | DeviceLock Me 1.42 (protect-me.com) | ||
disk usage. It can protect network and local computers against viruses, trojans and other malicious programs often injected from removable disks. Network administrators can also use DeviceLock Me to flush a storage device's buffers. Remote control is also available. DeviceLock Millennium Edition gives network administrators control over which users can access what | |||
Updated: 9, 2005 | Rating: 16 | Author: Ashot Oganesyan | Size: 1167 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
699. | DiamondCS ProcessGuard 3.150 (diamondcs.com.au) | ||
program by patching it in memory so that it no longer detected any viruses, so even with a database update and even if it was a known trojan it would remain undetected. Rootkits are another serious threat, because once they've infected your system they can often be extremely difficult to detect (as | |||
Updated: 9, 2005 | Rating: 0 | Author: DiamondCS Support | Size: 1922 kb | Shareware Go to category: Security & Privacy > Access Control Similar programs | |||
700. | Dirlot 0.9 (soft.km.ua) | ||
on parent directory and how space is distributed among the directory's elements. You can also: - change parent directory - view files' meta-data (creation date etc) - select sort order (by size and name) - select linear, logarithmic and root scale of diagram columns - view size in bytes, Kbytes and Mbytes. The utility uses color coding to present size information, so bigger | |||
Updated: 9, 2005 | Rating: 0 | Author: Olexandr Lykho | Size: 11 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Viruses software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|